809 resultados para Privacy.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information privacy is a crucial aspect of eHealth. Appropriate privacy management measures are therefore essential for its success. However, traditional measures for privacy preservation such as rigid access controls (i.e., preventive measures) are not suitable to eHealth because of the specialised and information - intensive nature of healthcare itself, and the nature of the information. Healthcare professionals (HCP) require easy, unrestricted access to as much information as possible towards making well - informed decisions. On the other end of the scale however, consumers (i.e., patients) demand control over their health information and raise concerns for privacy arising from internal activities (i.e., information use by HCPs). A proper balance of these competing concerns is vital for the implementation of successful eHealth systems. Towards reaching this balance, we propose an information accountability framework (IAF) for eHealth systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Executive Summary The Australian Psychological Society categorically condemns the practice of detaining child asylum seekers and their families, on the grounds that it is not commensurate with psychological best practice concerning children’s development and mental health and wellbeing. Detention of children in this fashion is also arguably a violation of the UN Convention on the Rights of the Child. A thorough review of relevant psychological theory and available research findings from international research has led the Australian Psychological Society to conclude that: • Detention is a negative socialisation experience. • Detention is accentuates developmental risks. • Detention threatens the bonds between children and significant caregivers. • Detention limits educational opportunities. • Detention has traumatic impacts on children of asylum seekers. • Detention reduces children’s potential to recover from trauma. • Detention exacerbates the impacts of other traumas. • Detention of children from these families in many respects is worse for them than being imprisoned. In the absence of any indication from the Australian Government that it intends in the near future to alter the practice of holding children in immigration detention, the Australian Psychological Society’s intermediate position is that the facilitation of short-term and long-term psychological development and wellbeing of children is the basic tenet upon which detention centres should be audited and judged. Based on that position, the Society has identified a series of questions and concerns that arise directly from the various psychological perspectives that have been brought to bear on estimating the effects of detention on child asylum seekers. The Society argues that, because these questions and concerns relate specifically to improvement and maintenance of child detainees’ educational, social and psychological wellbeing, they are legitimate matters for the Inquiry to consider and investigate. • What steps are currently being taken to monitor the psyc hological welfare of the children in detention? In particular, what steps are being taken to monitor the psychological wellbeing of children arriving from war-torn countries? • What qualifications and training do staff who care for children and their families in detention centres have? What knowledge do they have of psychological issues faced by people who have been subjected to traumatic experiences and are suffering high degrees of anxiety, stress and uncertainty? • What provisions have been made for psycho-educational assessment of children’s specific learning needs prior to their attending formal educational programmes? • who are suffering chronic and/or vicarious trauma as a result of witnessing threatening behaviour whilst in detention? • What provisions have been made for families who have been seriously affected by displacement to participate in family therapy? • What critical incident debriefing procedures are in place for children who have witnessed their parents, other family members, or social acquaintances engaging in acts of self-harm or being harmed while in detention? What psychotherapeutic support is in place for children who themselves have been harmed or have engaged in self- harmful acts while in detention? • What provisions are in place for parenting programmes that provide support for parents of children under extremely difficult psychological and physical circumstances? • What efforts are being made to provide parents with the opportunity to model traditional family roles for children, such as working to earn an income, meal preparation, other household duties, etc.? • What opportunities are in place for the assessment of safety issues such as bullying, and sexual or physical abuse of children or their mothers in detention centres? • How are resources distributed to children and families in detention centres? • What socialization opportunities are available either within detention centres or in the wider community for children to develop skills and independence, engage in social activities, participate in cultural traditions, and communicate and interaction with same-age peers and adults from similar ethnic and religious backgrounds? • What access do children and families have to videos, music and entertainment from their cultures of origin? • What provisions are in place to ensure the maintenance of privacy in a manner commensurate with usual cultural practice? • What is the Government’s rationale for continuing to implement a policy of mandatory detention of child asylum seekers that on the face of it is likely to have a pernicious impact on these children’s mental health? • In view of the evidence on the potential long-term impact of mandatory detention on children, what processes may be followed by Government to avoid such a practice and, more importantly, to develop policies and practices that will have a positive impact on these children’s psychological development and mental health?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The availability of health information is rapidly increasing; its expansion and proliferation is inevitable. At the same time, breeding of health information silos is an unstoppable and relentless exercise. Information security and privacy concerns are therefore major barriers in the eHealth socio-eco system. We proposed Information Accountability as a measurable human factor that should eliminate and mitigate security concerns. Information accountability measures would be practicable and feasible if legislative requirements are also embedded. In this context, information accountability constitutes a key component for the development of effective information technology requirements for health information system. Our conceptual approach to measuring human factors related to information accountability in eHealth is presented in this paper with some limitations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider the problem of maximizing the secure connectivity in wireless ad hoc networks, and analyze complexity of the post-deployment key establishment process constrained by physical layer properties such as connectivity, energy consumption and interference. Two approaches, based on graph augmentation problems with nonlinear edge costs, are formulated. The first one is based on establishing a secret key using only the links that are already secured by shared keys. This problem is in NP-hard and does not accept polynomial time approximation scheme PTAS since minimum cutsets to be augmented do not admit constant costs. The second one extends the first problem by increasing the power level between a pair of nodes that has a secret key to enable them physically connect. This problem can be formulated as the optimal key establishment problem with interference constraints with bi-objectives: (i) maximizing the concurrent key establishment flow, (ii) minimizing the cost. We prove that both problems are NP-hard and MAX-SNP with a reduction to MAX3SAT problem.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis investigates the role of personal Digital Stories shared in public spaces as catalysts for social change. By analysing the influence of workshop facilitators, organisations, digital platforms and networked publics on voice and self-representation, it sheds light on shifting meanings of publicness and privacy, both face to face and online. This thesis argues that, despite numerous obstacles, the cumulative influence of diverse voices dispersed among networked publics shape new cultural norms, thereby contributing to gradual social change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This tutorial is primarily based on the IEEE eHealth technical committee Newsletter published in March 2013. Its main focus is on information privacy management in eHealth through information accountability. The tutorial consists of three main aspects of a proposed information accountability framework for eHealth, namely, social aspects, technical aspects and legal aspects. Following a brief introduction of the problem domain and context, we present the tutorial in these three main components. The length of the tutorial is intended to be half a day.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We are pleased to present the papers from the Australasian Health Informatics and Knowledge Management (HIKM) conference stream held on 20 January 2011 in Perth as a session of the Australasian Computer Science Week (ASCW) 2011. Formerly HIKM was named Health Data and Knowledge Management, however the inclusion of the health informatics term is timely given the current health reform. The submissions to HIKM 2011 demonstrated that Australasian researchers lead with many research and development innovations coming to fruition. Some of these innovations can be seen here, and we believe further recognition will accomplish by continuation to HIKM in the future. The HIKM conference is a review of health informatics related research, development and education opportunities. The conference papers were written to communicate with other researchers and share research findings, capturing each and every aspect of the health informatics field. They are namely: conceptual models and architectures, privacy and quality of health data, health workflow management patient journey analysis, health information retrieval, analysis and visualisation, data integration/linking, systems for integrated or coordinated care, electronic health records (EHRs) and personally controlled electronic health records (PCEHRs), health data ontologies, and standardisation in health data and clinical applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Health care is an information-intensive business. Sharing information in health care processes is a smart use of data enabling informed decision-making whilst ensuring. the privacy and security of patient information. To achieve this, we propose data encryption techniques embedded Information Accountability Framework (IAF) that establishes transitions of the technological concept, thus enabling understanding of shared responsibility, accessibility, and efficient cost effective informed decisions between health care professionals and patients. The IAF results reveal possibilities of efficient informed medical decision making and minimisation of medical errors. Of achieving this will require significant cultural changes and research synergies to ensure the sustainability, acceptability and durability of the IAF

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Availability of health information is rapidly increasing and the expansion and proliferation of health information is inevitable. The Electronic Healthcare Record, Electronic Medical Record and Personal Health Record are at the core of this trend and are required for appropriate and practicable exchange and sharing of health information. However, it is becoming increasingly recognized that it is essential to preserve patient privacy and information security when utilising sensitive information for clinical, management and administrative processes. Furthermore, the usability of emerging healthcare applications is also becoming a growing concern. This paper proposes a novel approach for integrating consideration of information accountability with a perspective from usability engineering that can be applied when developing healthcare information technology applications. A social networking user case in the healthcare information exchange will be presented in the context of our approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is the result of an investigation into information privacy management in eHealth. It explores the applicability of accountability measures as a means of protection of eHealth consumer privacy. The thesis presented a new concept of Accountable eHealth Systems for achieving a balance between the information privacy concerns of eHealth consumers and the information access requirements of healthcare professionals and explored the social, technological and implementation aspects involved in such a system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The exchange between the body and architecture walks a fine line between violence and pleasure. It is through the body that the subject engages with the architectural act, not via thought or reason, but through action. The materiality of architecture is the often the catalyst for some intense association; the wall that defines gender or class, the double bolted door that incarcerates, the enclosed privacy of the bedroom to the love affair. Architecture is the physical manifestation of Lefebvre’s inscribed space. It enacts the social and political systems through bodily occupation. Architecture, when tested by the occupation of bodies, anchors ideology in both space and time. The architect’s script can be powerful when rehearsed honestly to the building’s intentions and just as beautiful when rebuked by the act of protest or unfaithful occupation. This research examines this fine line of violence and pleasure in architecture through performance, in the work of Bryony Lavin’s play Stockholm and Revolving Door by Allora & Calzadilla as part of the recent Kaldor Public Art Projects exhibition 13 Rooms in Sydney. The research is underpinned by the work of Architect and theorist, Bernard Tschumi in his two essays, Violence of Architecture and The Pleasure of Architecture. Studying architecture through the lens of performance shifts the focus of examination from pure thought to the body; because architecture is occupied through the body and not the mind.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Council of Australian Governments (COAG) in 2003 gave in-principle approval to a best-practice report recommending a holistic approach to managing natural disasters in Australia incorporating a move from a traditional response-centric approach to a greater focus on mitigation, recovery and resilience with community well-being at the core. Since that time, there have been a range of complementary developments that have supported the COAG recommended approach. Developments have been administrative, legislative and technological, both, in reaction to the COAG initiative and resulting from regular natural disasters. This paper reviews the characteristics of the spatial data that is becoming increasingly available at Federal, state and regional jurisdictions with respect to their being fit for the purpose for disaster planning and mitigation and strengthening community resilience. In particular, Queensland foundation spatial data, which is increasingly accessible by the public under the provisions of the Right to Information Act 2009, Information Privacy Act 2009, and recent open data reform initiatives are evaluated. The Fitzroy River catchment and floodplain is used as a case study for the review undertaken. The catchment covers an area of 142,545 km2, the largest river catchment flowing to the eastern coast of Australia. The Fitzroy River basin experienced extensive flooding during the 2010–2011 Queensland floods. The basin is an area of important economic, environmental and heritage values and contains significant infrastructure critical for the mining and agricultural sectors, the two most important economic sectors for Queensland State. Consequently, the spatial datasets for this area play a critical role in disaster management and for protecting critical infrastructure essential for economic and community well-being. The foundation spatial datasets are assessed for disaster planning and mitigation purposes using data quality indicators such as resolution, accuracy, integrity, validity and audit trail.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study analyses young gay men's identity management in social networking sites Gaydar and Facebook. It examines the expanded opportunities for identity management made available through the convergence of these spaces, as well as new privacy and safety concerns. Findings from this study are discussed in terms of their significance for gay men's digital culture, the approach to gay men's mental health taken by GLBT organisations and support groups, and within broader concerns around social networking sites and digital inequality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The cities of Saudi Arabia have perhaps the largest growth rates of cities in the Middle East, such that it has become a cause in shortage of housing for mid and low-income families, as is the case in other developing countries. Even when housing is found, it is not sustainable nor is it providing the cultural needs of those families. The aim of this paper is to integrate the unique conservative Islamic Saudi culture into the design of sustainable housing. This paper is part of a preliminary study of an on-going PhD thesis, which utilises a semistructured interview of a panel of nine experts in collecting the data. The interviews consisted of ten questions ranging from general questions such as stating their expertise and work position to more specific question such as listing the critical success factors and/or barriers for applying sustainability to housing in Saudi Arabia. Since the participants were selected according to their experience, the answers to the interview questions were satisfactory where the generation of the survey questions for the second stage in the PhD thesis took place after analysing the participant’s answers to the interview questions. This paper recommends design requirements for accommodating the conservative Islamic Saudi Culture in low cost sustainable houses. Such requirements include achieving privacy through the use of various types of traditional Saudi architectural elements, such as the method of decorative screening of windows, called Mashrabiya, and having an inner courtyard where the house looks inward rather than outward. Other requirements include educating firms on how to design sustainable housing, educating the public on the advantages of sustainable housing and implementing new laws that enforce the utilisation of sustainable methods to housing construction. This paper contributes towards the body of knowledge by proposing initial findings on how to integrate the conservative Islamic culture of Saudi Arabia into the design of a sustainable house specifically for mid and low-income families. This contribution can be implemented on developing countries in the region that are faced with housing shortage for mid and low-income families.